Publications
Publications
International Papers
Publication list at Google Scholar
2025
Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis [link, pdf] (Accepted for publication)
Youngjoon Kim, Sunguk Shin, Hyoungshick Kim and Ji Won Yoon, The 34th USENIX Security Symposium (USENIX Security '25 in BK21 CS list)
GNN-based Detection of Malicious Transactions in Ethereum Networks: Leveraging Tornado Cash Transaction Patterns [link, pdf] (Accepted for publication)
Junggeun Jeong and Ji Won Yoon, The 7th ACM International Symposium on Blockchain and Secure Critical Infrastructure (ACM BSCI 2025), AsiaCCS' Satellite Workshop
HyeongJoon Choi, and Ji Won Yoon, The second Workshop on Security and Privacy in Standardized IoT (SDIoTSec), NDSS's Satellite Workshop 2025
2024
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain [link]
Joon Soo Yoo, Baek-Kyung Song, Tae Min Ahn, Jiwon Heo and Ji Won Yoon, The 40th ACM/SIGAPP Symposium On Applied Computing (ACM SAC'25 in BK21 CS list)
Fast Private Location-based Information Retrieval over the Torus [link]
Joon Soo Yoo, Mi Yeon Hong, Ji Won Heo, Kang Hoon Lee, Ji Won Yoon, 20th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2024 in BK21 CS list)
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption [link]
Kanghoon Lee, Youngbae Jeon, and Ji Won Yoon, 9th IEEE European Symposium on Security and Privacy (Euro S&P 2024)
Accelerating Secure Permutation: Application to Matrix Algebra , [link]
Jiwon Heo, Joonsoo Yoo, Baekyung Song, and Jiwon Yoon, IEEE Access, 2024
Ghost in the radio: An audio adversarial attack using environmental noise through radio [link]
Hyoungjun Choi, Jihyuk Jung, and Ji Won Yoon, IEEE Access, 2024
Detection of Defects on Cut-out Switches in High-resolution images Based on YOLOv5 Algorithm [link]
Youngjun Kim, Sung Soo Lim, Se-Yeong and Ji Won Yoon, Journal of Electrical Engineering & Technology, 06 March 2024
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4 [link]
Ji Hyuk Jung, Mi Yeon Hong, Hyeongjun Choi, and Ji Won Yoon, IEEE Access, Volume 12
2023
Equilibrium Point Learning [link]
Dowoo Baik, Ji Won Yoon, The 15th Asian Conference on Machine Learning (ACML), 2023
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain [link]
Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo and Ji Won Yoon , 28th European Symposium on Research in Computer Security (ESORICS) 2023 in BK21 CS list
Differential privacy using Gamma distribution [link]
Yongbin Park, Minchul Kim, Ji Won Yoon, Proceedings of the 22nd IEEE Statistical Signal Processing Workshop, SSP 2023
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption [link]
Kang Hoon Lee and Ji Won Yoon , 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (PKC) 2023
Invasion of location privacy using online map services and smartphone sensors [link]
Hyunsoo Kim, Youngbae Jeon, and Ji Won Yoon, The 18th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS) 2023 in BK21 CS list
BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework [link]
Youngjoon Kim, Insup Lee, Hyuk Kwon, Kyeongsik Lee, and Ji Won Yoon, IEEE Access, Volume 11, Page(s): 91949 - 91968, 18 August 2023, Electronic ISSN: 2169-3536, DOI: 10.1109/ACCESS.2023.3306593
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution [link]
I.-Y. Kwak, S. Kwag, J. Lee, Youngbae Jeon, Jeonghwan Hwang, H.-J. Choi, J.-H. Yang, S.-Y. Han, J. H. Huh, C.-H. Lee, Ji Won Yoon, IEEE Access, Volume 11, Page(s): 49140-49152, 12 May 2023, Electronics ISSN: 2169-3536, DOI: 10.1109/ACCESS.2023.3275790
CASPER: Covert Channel Using Internal Speakers [link]
Hyeongjun Choi, Ji Hyuk Jung, and Ji Won Yoon. 2023. Sensors 23, no. 6: 2970. https://doi.org/10.3390/s23062970
** This paper is cited from various mass media in online as follows!
bleepingcomputer [link], bitdefender [link], heimdalsecurity [link], goincognito [link], latesthackingnews [link], and extra
Clock Offset Estimation for Systems with Asymmetric Packet Delays [link]
Y.M. Ha, U.J. Pak, J.K, T.H. Kim and Ji Won Yoon, IEEE/ACM Transactions on Networking , Volume: 31, Issue: 4, pp. 1838 - 1853, 03 January 2023, DOI: 10.1109/TNET.2022.3229407
2022
Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video [link]
Youngbae Jeon, Hyekyung Han, and Ji Won Yoon , International Conference on Pattern Recognition (ICPR) 2022, in BK21 CS list
A Phase-Based Approach for ENF Signal Extraction From Rolling Shutter Videos [link]
Hyekyung Han, Youngbae Jeon, Baek-kyung Song and Ji Won Yoon, IEEE Signal Processing Letters, Volume 29, Pages 1724-1728, 08 July, 2022 DOI: 10.1109/LSP.2022.3189306
The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information [link]
Mi Yeon Hong, Ji Won Yoon, PLOS ONE 17.2 (2022)
2021
Efficient Adaptation of TFHE for High End-to-End Throughput [link]
Kang Hoon Lee and Ji Won Yoon, International Conference on Information Security Applications (WISA 2021)
t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme [link]
J. S. Yoo, J.W. Yoon, Security and Communication Networks (2021)
A new approach to training more interpretable model with additional segmentation [link]
Sunguk Shin, Youngjoon Kim, and Ji Won Yoon, Pattern Recognition Letters, Volume 152, December 2021, Pages 188-194 (2021)
Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points [link]
Youngbae Jeon, Ji Hyeok Jung, Ji Won Yoon, IEEE Access 9, 74275-74285
2020
Location tracking technique for Regional ENF Classification Using ARIMA [link]
S. Kim, J. W. Yoon, ICTC 2020
Comparison of various interpolation techniques to infer localization of audio files using ENF signals [link]
H Han, KH Lee, Y Jeon, JW Yoon, 2020 International Conference on Software Security and Assurance (ICSSA), 46-51
ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map [link]
I. Kwak, S. Kwak, J. Lee, J. H. Huh, C. Lee, Y. B. Jeon, J. Hwang, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2020, in BK21 CS list)
Maxafl: Maximizing code coverage with a gradient-based optimization technique, [link]
Y Kim, J Yoon, Electronics 10 (1), 11
Homomorphic Model Selection for Data Analysis in an Encrypted Domain [link]
M.Y. Hong, J.S. Yoo, and J. W. Yoon, Applied Sciences 10.18 (2020): 6174
An Automated End-to-End Side Channel Analysis Based on Probabilistic Model [link]
J. Hwang and J. W. Yoon, Applied Science, 30 March 2020 [area: signal processing and information security]
2019
Static Malware Analysis in Encrypted Domain [link]
T. Hwang and J. W. Yoon, ICTC, 2019
Forecasting the Electric Network Frequency signals on Power Grid [link]
W. Bang, and J. W. Yoon, ICTC 2019
Model Selection for data analysis in encrypted domains: application to simple linear regression [link]
M. Hong, J. W. Yoon, WISA 2019, Lecture Notes in Computer Science book series (LNCS, volume 11897)
A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme [link pdf]
J. S. Yoo, J. H. Hwang, B. K. Song and J. W. Yoon, The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis [link]
I. Y. Kwak, I.J. Kim, J.H. Huh, and J. W. Yoon, The ACM CHI Conference on Human Factors in Computing Systems, (CHI 2019), in BK21 CS list
The power grid estimation using Electric Network Frequency signals [link]
W. Bang, and J. W. Yoon, Security and Communication Networks 2019, [area: signal processing and information security]
A global sampler of single particle tracking solutions for single molecule microscopy [link]
PLOS ONE 2019, October 28, 2019, https://doi.org/10.1371/journal.pone.0221865 [area: statistical signal processing]
A Bitwise Design and Implementation for Privacy Preserving Data Mining: From Atomic Operations to Advanced Algorithms
B. K. Song, J. S. Yoo, M. Hong, and J. W. Yoon, Security and Communication Networks 2019, [area: cryptography and security]
2018
A New Bayesian Approach to Exploring Damaged assets by Monitoring Mission Failures Caused by Undetected Attack
S.W. Shim and J. W. Yoon, WISA 2018
Logarithm Design on Encrypted Data with Bitwise Operation
J. S. Yoon, B.K. Song, and J. W. Yoon, WISA 2018
I'm Listening to your Location! Inferring User Location with Acoustic Side Channel
Y. Jeon, M. Kim, H. Kim, H. Kim, J. H. Huh and J. W. Yoon, “The Web Conference 2018” (WWW 2018), in BK21 CS list)
PD-FDS: Purchase Density based Online Credit Card Fraud Detection System [link]
Y.J. Ki and J. W. Yoon, Proceedings of the KDD 2017: Workshop on Anomaly Detection in Finance, PMLR 71:76-84, 2018.
2017
A new side channel attack on digital door lock with vibration signal analysis: The longer password does not guarantee higher security level
Y. M. Ha, S. H. Jang, K. W. Kim and J. W. Yoon, International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017 [link]
Construction of a National Scale ENF Map using Online Multimedia Data
H. Kim, Y. Jeon and J. W. Yoon, ACM International Conference on Information and Knowledge Management, long full research paper (CIKM) 2017, in BK21 CS list, [link]
Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images
S. Lee and J. W. Yoon, WISA, 2017 (Best paper awarded)
An efficient method to securely store and handle genomic data [link]
Y.J. Ki and J. W. Yoon, 2017 International Conference on Software Security and Assurance (ICSSA)
The vulnerability exploitation conveying digital data over mobile voice call channels [link]
S.J. Lee, Y.M. Ha, S.J. Yoon, H.J. Jo, S.H. Jang, J.Y. Lee, Y.A. Kim and J. W. Yoon, Wireless Personal Communications, 25, May, 2017 [area: AI, Communication and security]
2016
Classification of Home Appliance by using Probabilistic KNN with Sensor Data [link]
Seung-Joon Kang, and J. W. Yoon, the Asia-Pacific Signal and Information Processing Association (APSIPA), 2016 [area: signal processing and IoT]
A new approach to building a disguised server using the honey port against general scanning attacks [link]
Hyunsoo Park, Youngbae Jeon, and J. W. Yoon, The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 2016 [area: Network security]
A Practical approach to constructing triple-blind review process with maximal anonymity and fairness [link]
J. S. Jung, J.-I. Kim and J. W. Yoon, The 17th World Conference on Information Security Applications (WISA), 2016 [area: privacy and anomaly]
Honey Chatting: A Novel Instant Messaging System Robust to Eavesdropping over Communication [link, poster]
J.-I. Kim and J. W. Yoon, IEEE the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016
An adaptive approximation for Gaussian wavelet Kernel [link]
Y. M. Ha and J. W. Yoon, IEEE The 18th International Conference on Advanced Communications Techology (ICACT) 2016
An efficient geometric shape coding and representation approach to obtain both skeleton and contours
J. W. Yoon, ACM IMCOM, 2016 [area: Computer vision]
A new Bayesian edge linking algorithm using single target tracking techniques [link matlab_code]
J. W. Yoon, Symmetry 2016, 8(12), 143
Bayesian Interpretation to Generalize Adaptive Mean Shift Algorithm [link]
J. W. Yoon, Journal of Intelligent and Fuzzy Systems, 2016
2015
A simple sequential outlier detection with several residuals [link]
J. W. Yoon, European Signal Processing Conference (EUSIPCO), 2015 [area: signal processing]
Various threat models to detour the air-gapped systems of network separation [link]
Eunchong Lee, Hyunsoo Kim, and Ji Won Yoon, The 16th International Workshop on Information Security Applications (WISA), 2015 [area: information security]
A new technique to protect confidential documents from shoulder surfers using a shuffling method [link]
Hyunsoo Kim, Hyoungshick Kim and Ji Won Yoon, ICSSA 2015, [area: information security] (Selected as the best student paper)
Visual Honey Encryption: Application to steganography [link]
J. W. Yoon, H. S. Kim, H. J. Jo, H. L. Lee, and K. S. Lee, ACM Information Hiding and Multimedia Security (ACM IH & MMSec) 2015 [area: information security]
Passing go with DNA sequencing: Delivering messages in a covert transgenic channel [link]
J. Y. Chun, H.-L. Lee and J. W. Yoon, 2nd International Workshop on Genome Privacy and Security (GenoPri 2015), held in conjunction with the 36th IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, 21, May, 2015
J. W. Yoon, IET Electronics Letters, 2015, Vol. 51, No. 6, pp. 484-486 [area: statistical signal processing]
A novel statistical approach to detect card frauds using transaction patterns [link]
C. C. Lee and J. W. Yoon, IEICE Transactions on Information and Systems, Vol.E98-D, No.3,pp.649-660, Mar. 2015.[area: signal processing and information security]
A new countermeasure against brute force attacks that use high performance computers for big data analysis [link]
H.-J. Jo and J. W. Yoon, International Journal of Distributed Sensor Networks, 2015 [area: cryptography and security]
2014
Structural code scheme against brute-force attack [link]
H. J. Jo and J. W. Yoon, The 15th International Workshop on Information Security Applications (WISA 2014), [area: information security and applied mathematics]
Statistical coding scheme for the protection of cryptographic systems against brute-force attack (Poster) [link]
H. J. Jo and J. W. Yoon, IEEE Symposium on Security and Privacy (S&P), poster session, 2014 [area: information security and applied mathematics]
Efficient model selection for probabilistic K nearest neighbour classification [link]
J. W. Yoon and Nial Friel, Neurocomputing, 2014[area: signal processing]
Bayesian reconstruction of Projection Reconstruction NMR (PR-NMR) [link]
J. W. Yoon, 2014, Computers in Biology and Medicine, Volume 54, Pages 89–99, November 1, 2014.(Selected as a Honorable Mention Paper) [area: signal processing and medicine
Statistical Denoising Scheme for single molecule fluorescence microscopic images [link]
J. W. Yoon, Biomedical Signal Processing and Control, Volume 10, March 2014, Pages 11–20, [area: signal processing and applied mathematics]
2013
Extracting Image Features for a new steganalysis approach
H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]
Network Analysis of Korean legislators using Bipartite projection
J. Y. Lee, H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security], [link]
2012
Bayesian separation of wind power generation signals
J. W. Yoon, F. Fusco, M. Wurst, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list, [link]
Mining residential household information from low-resolution smart meter data
F. Fusco, M. Wurst, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list, [link]
Bayesian implementation of a Lagrangian macroscopic traffic flow model
J. W. Yoon, T. T. Tchrakian, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list, [link]
Predicting arrival times of buses using real-time GPS measurements
M. Sinn, J. W. Yoon, F. Calabrese, E. Bouillet, IEEE international conference on Intelligent Transportation systems (ITSC), 2012, [link]
Cityride: a predictive bike sharing journey advisor
J. W. Yoon, F. Pinelli, F. Calabrese, IEEE International conference on mobile data management, (MDM) 2012, [link]
Network analysis of temporal trends in scholarly research productivity [link]
H. Kim, J. W. Yoon and J. Crowcroft, Journal of Informetrics, 2012, Volume 6, no. 1, pp. 97--110
2011
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels
J. W. Yoon, H. J. Lee, and H. S. Kim, International Conference on Ubiquitous Information Management and Communication, 2011, [link]
Large-scale Bayesian ICA with application to separation of the cosmic microwave background
S. P. Wilson, and J. W. Yoon, Big Learning, Workshop of NIPS, 2011, [link]
Inference for latent variable models with many hyper-parameters
J. W. Yoon and S. P. Wilson, World Statistical Congress, 2011, (ISI) , [link]
The Efficient Gaussian Approximation for a class of Latent Gaussian model
J. W. Yoon and S. Wilson, Irish conference on Signals and Systems (ISSC), 2011 , [link]
Bayesian inference for an adaptive ordered probit model: An application to brain computer interfacing [link]
J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, Neural Networks, 2011, v. 24, no. 7, pp. 726--734
A perfect collision-free pseudonym system [link]
J. W. Yoon and H. S. Kim, IEEE Communications letters, 2011, vol 15, no. 6, pp. 686--688
2010
Improved Mean Shift Algorithm with Heterogeneous Node Weights
J. W. Yoon, and S. P. Wilson,International conference of Pattern Recognition (ICPR), 2010, in BK21 CS list , [link]
A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra
J. W. Yoon, S. P. Wilson, K. H. Mok, International Conference on Artificial Intelligence and Statistics (AISTATS), 2010, in BK21 CS list, link
An image encryption scheme with a pseudorandom permutation based on chaotic maps [link]
J. W. Yoon and H. S. Kim, (2010), Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 3998--4006
Hybrid spam filtering fro mobile communication [link]
J. W. Yoon and H. S. Kim, and J. H. Hur, (2010), Computers & Security, vol. 29, no. 4, pp. 446--459
Robust measurement validation in target tracking using geometric structure [link]
J. W. Yoon and S. J. Roberts, (2010), IEEE Signal Processing Letters, vol 17, no. 5, pp. 493--496
2009
A new collision-free pseudonym scheme in mobile ad-hoc network
J. W. Yoon, and H. S. Kim, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2009. (WiOPT), [link]
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling [link]
J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, (2009), Neural Networks, vol. 22, no. 9, pp. 1286--1294
DySCo: quantitating associations of membrane proteins using two-color single molecule tracking [link]
P. D. Dunne, R. A. Fenandes, J. McColl, J. W. Yoon, J. R. James, S. J. Dvis, D. Klenerman, 2009, Biophysical Journal, Vol 97, No. 4, pp. L5--L7
2008
Adaptive Classification by hybrid EKF with truncated filtering: Brain Computer Interfacing
J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, Intelligent Data Engineering and Automated Learning (IDEAL) 2008, [link]
Sequential Bayesian Estimation for Adaptive Classification
J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2008, [link]
Bayesian inference for improved single molecule fluorescence tracking [link]
J. W. Yoon, A. Bruckbauer, W. J. Fitzgerald, D. Klenerman, 2008, Biophysical Journal, vol 94, No. 12, pp. 4932--4947
2007
Bayesian Inference for 2D gel electrophoresis image analysis
J. W. Yoon, S. J. Godsill, C. H. Kang, T. S. Kim, Bioinformatics Research and Development 2007, [link]
Nanopipette delivery of individual molecules to cellular compartments for single molecule fluorescence tracking [link]
A. Bruckbauer, P. James, D. Zhou, J. W. Yoon, D. Excell, Y. Korchev, R. Jones, D. Klenerman, 2007, Biophysical Journal, Vol. 93, No. 9, pp. 3120--3131
2006
Bayesian inference for multidimensional NMR image reconstruction
J. W. Yoon, and S. J. Godsill, European Signal Processing Conference (EUSIPCO), 2006, [link]
Deterministic and Statistical methods for reconstructing multidimensiional NMR spectra [link]
J. W. Yoon, S. Godsill, E. Kupce, R. Freeman, 2006, Magnetic Resonance in Chemistry, Vol 44, No 3, pp. 197--209